• 제목/요약/키워드: Chaotic map

검색결과 114건 처리시간 0.025초

Anticontrol of Chaos for a Continuous-time TS Fuzzy System via Time-delay Feedback

  • Zhong Li;Park, Jin-Bea;Joo, Young-Hoon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.108.1-108
    • /
    • 2001
  • A time-delay feedback control approach is proposed for making a given stable continuous-time Takagi-Sugeno (TS) fuzzy system chaotic, which is based on the fuzzy feedback linearization and a suitable approximate relationship between a time-delay differential equation and a discrete map. The time-delay feedback controller, chosen among several candidates, is a simple sinusoidal function of the delay states of the system, which has small amplitude. This approach is mathematically proven for rigorous generation of chaos from stable continuous-time TS fuzzy systems, where the generated chaos is in the sense of Li and Yorke. Numerical examples are included to visualize the theoretical analysis and the controller design.

  • PDF

Wavelet-Based Semi-Fragile Watermarking with Tamper Detection

  • Lee, Jun-Hyuk;Jung, Hun;Seo, Yeung-Su;Yu, Chun-Gun;Park, Hae-Woo
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.93-97
    • /
    • 2008
  • In this letter, a novel wavelet-based semi-fragile watermarking scheme is presented which exploiting the time-frequency feature of chaotic map. We also analyze the robustness to mild modification and fragility to malicious attack of our scheme. Its application includes tamper detection, image verification and copyright protection of multimedia content. Simulation results show the scheme can detect and localize malicious attacks with high peak signal-to-noise ratio(PSNR), while tolerating certain degree of JPEG compression and channel additive white Gaussian noise(AWGN)

  • PDF

PRaCto: Pseudo Random bit generator for Cryptographic application

  • Raza, Saiyma Fatima;Satpute, Vishal R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6161-6176
    • /
    • 2018
  • Pseudorandom numbers are useful in cryptographic operations for using as nonce, initial vector, secret key, etc. Security of the cryptosystem relies on the secret key parameters, so a good pseudorandom number is needed. In this paper, we have proposed a new approach for generation of pseudorandom number. This method uses the three dimensional combinational puzzle Rubik Cube for generation of random numbers. The number of possible combinations of the cube approximates to 43 quintillion. The large possible combination of the cube increases the complexity of brute force attack on the generator. The generator uses cryptographic hash function. Chaotic map is being employed for increasing random behavior. The pseudorandom sequence generated can be used for cryptographic applications. The generated sequences are tested for randomness using NIST Statistical Test Suite and other testing methods. The result of the tests and analysis proves that the generated sequences are random.

Development of Standard Hill Technology for Image Encryption over a 256-element Body

  • JarJar, Abdellatif
    • Journal of Multimedia Information System
    • /
    • 제8권1호
    • /
    • pp.45-56
    • /
    • 2021
  • This document traces the new technologies development based on a deep classical Hill method improvement. Based on the chaos, this improvement begins with the 256 element body construction, which is to replace the classic ring used by all encryption systems. In order to facilitate the application of algebraic operators on the pixels, two substitution tables will be created, the first represents the discrete logarithm, while the second represents the discrete exponential. At the same time, a large invertible matrix whose structure will be explained in detail will be the subject of the advanced classical Hill technique improvement. To eliminate any linearity, this matrix will be accompanied by dynamic vectors to install an affine transformation. The simulation of a large number of images of different sizes and formats checked by our algorithm ensures the robustness of our method.

시계열자료 눈집방법의 비교연구 (Comparison Study of Time Series Clustering Methods)

  • 홍한움;박민정;조신섭
    • 응용통계연구
    • /
    • 제22권6호
    • /
    • pp.1203-1214
    • /
    • 2009
  • 본 논문에서는 시계열자료의 군집분석을 위해 시간영역과 진동수영역에서의 군집 방법들을 소개하고 각 방법들의 장단점에 대해 논의하였다. KOSPI 200에 속한 15개 기업의 일별 주가자료률 이용한 비교분석 결과 비모수적인 방법인 웨이블릿을 이용한 군집분석이 가장 좋은 결과를 보였다. 비정상 시계열자료의 경우 차분 보다는 EMD를 이용하여 추세를 제거하는 방법이 스펙트럼 밀도함수를 이용한 군집분석에 더 효율적이었다.

An Adaptive FEC Code Control Algorithm for Mobile Wireless Sensor Networks

  • Ahn Jong-Suk;Hong Seung-Wook;Heidemann John
    • Journal of Communications and Networks
    • /
    • 제7권4호
    • /
    • pp.489-498
    • /
    • 2005
  • For better performance over a noisy channel, mobile wireless networks transmit packets with forward error correction (FEC) code to recover corrupt bits without retransmission. The static determination of the FEC code size, however, degrades their performance since the evaluation of the underlying channel state is hardly accurate and even widely varied. Our measurements over a wireless sensor network, for example, show that the average bit error rate (BER) per second or per minute continuously changes from 0 up to $10^{-3}$. Under this environment, wireless networks waste their bandwidth since they can't deterministically select the appropriate size of FEC code matching to the fluctuating channel BER. This paper proposes an adaptive FEC technique called adaptive FEC code control (AFECCC), which dynamically tunes the amount of FEC code per packet based on the arrival of acknowl­edgement packets without any specific information such as signal to noise ratio (SNR) or BER from receivers. Our simulation experiments indicate that AFECCC performs better than any static FEC algorithm and some conventional dynamic hybrid FEC/ARQ algorithms when wireless channels are modeled with two-state Markov chain, chaotic map, and traces collected from real sensor networks. Finally, AFECCC implemented in sensor motes achieves better performance than any static FEC algorithm.

비틀림 하중을 받는 얇은 빔의 동적 불안정성에 관한 연구 (Study on the Dynamic Torsional Instability of a Thin Beam)

  • 박진선;주재만;박철희
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 1995년도 추계학술대회논문집; 한국종합전시장, 24 Nov. 1995
    • /
    • pp.185-190
    • /
    • 1995
  • In recent years, many researcher have been interested in the stability of a thin beam. Among them, Pai and Nayfeh[1] had investigated the nonplanar motion of the cantilever beam under lateral base excitation and chaotic motion, but this study is associated with internal resonance, i.e. one to one resonance. Also Cusumano[2] had made an experiment on a thin beam, called Elastica, under bending loads. In this experiment, he had shown that there exists out-of-plane motion, involving the bending and the torsional mode. Pak et al.[3] verified the validity of Cusumano's experimental works theoretically and defined the existence of Non-Local Mode(NLM), which is came out due to the instability of torsional mode and the corresponding aspect of motions by using the Normal Modes. Lee[4] studied on a thin beam under bending loads and investigated the routes to chaos by using forcing amplitude as a control parameter. In this paper, we are interested in the motion of a thin beam under torsional loads. Here the form of force based on the natural forcing function is used. Consequently, it is found that small torsional loads result in instability and in case that the forcing amplitude is increasing gradually, the motion appears in the form of dynamic double potential well, finally leads to complex motion. This phenomenon is investigated through the poincare map and time response. We also check that Harmonic Balance Method(H.B.M.) is a suitable tool to calculate the bifurcated modes.

  • PDF

해저 파문에서의 입자의 라그란지적 혼돈 및 확산 (Lagrangian Chaos and Dispersion of Passive Particles on the Ripple Bed)

  • 김현민;서용권
    • 한국해양공학회지
    • /
    • 제7권1호
    • /
    • pp.13-24
    • /
    • 1993
  • 해양오염은 환경파괴의 주요 인자이다. 해양바닥에 가라않은 오염물질을 근본적으로 제거하는 문제와는 별도로, 파동(wave)에 의해 그것이 자동적으로확산될 수가 있다. 파문(ripple)으로 덮혀진 해저(sea bottom)에서 표면의 중력파에 의한 물의 수평방향 요동운동은 와류(vrotices)를 발생시칸다. 이런한 유동장은 해저 침전물을 부유시켜 멀리까지 화가신시키는 작용을 한다.파문주위의 유동장을 살펴보면 모서리(crest)에서 발생된 와류로 인해 정상유동성분이 존재하며 이런한 정상유동은 파문의 주기적 형상으로인해 다분히 순환적이다. 이ㅔ 파동에 의한 요동운동이 가세하면 Taylor 와류와 같은 효과를 보여 줄 것이다. 해저부근에서의 이러한 확산효과를 보기 위하여, 해양유동을 단순화하여 최근 널리 이용되고 있는 혼돈이론을 가미시켰다. 아주 단순한 유동이라도 복잡한 입자의 궤적을 나타내며 입자의 확산과 연관됨을 수치해석을 이용하여 보여준다.

  • PDF

바이스펙트럼에 의한 비선형 시계열 신호 해석과 그 응용 (Analysis of Nonlinear Time Series by Bispectrum Methods and its Applications)

  • 김응수;이유정
    • 한국정보처리학회논문지
    • /
    • 제6권5호
    • /
    • pp.1312-1322
    • /
    • 1999
  • The world of linearity, which is regular, predictable and irrelevant to time sequence in most natural phenomenon, is a very small part. In fact, signals generated from natural phenomenon with which we're in contact are showed only slight linearity. Therefore it is very difficult to understand and analyze natural phenomenon with only predictable and regular linear systems. Due to these reasons researches concerning non-linear signals that of analysis were excluded being regarded as noise are being actively carried out. Countless signals generated from nonlinear system have the information about itself, and analyzing those signals and get information from it, that will be able to be used effectively in so may fields. Hence, in this paper we used a higher order spectrum, especially the bispectrum. After we prove the validity applying bispectrum to logistic map, which is typical chaotic signal. Subsequently by showing the result applying for actual signal analysis of EEG according to auditory stimuli, we show that higher order spectra is a very useful parameter in analysis of non-linear signals and the result of EEG analysis according to auditory stimuli.

  • PDF

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.